CVE-2016-5195
CVE Published | 2016-11-10 |
---|---|
Related CWE(s) | CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
Related Vendor(s) | fedoraproject, redhat, linux, canonical, paloaltonetworks, netapp, debian |
Related Product(s) | enterprise_linux_long_life, linux_kernel, enterprise_linux, oncommand_performance_manager, fedora, enterprise_linux_eus, cloud_backup, hci_storage_nodes, ubuntu_linux, enterprise_linux_aus, ontap_select_deploy_administration_utility, snapprotect, debian_linux, solidfire, pan-os, oncommand_balance, oncommand_unified_manager_for_clustered_data_ontap, enterprise_linux_tus |
Exploitation Reported (CISA KEV) | 2022-03-03 |
CVSS 3 Base Score | 7.0 (HIGH) |
CVSS 3 Attack Complexity | HIGH |
CVSS 3 Attack Vector | LOCAL |
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph
Threat Reports Related to CVE-2016-5195
Report
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks
This article by researchers at Trend Micro discusses an Advanced Persistent Threat (APT) group they name Earth Krahang who have been observed ...